top of page
  • Writer's pictureSonja

Intelligent Cyber Security


As companies embrace the opportunities presented by cloud and mobile computing to connect with customers and optimize operations, they take on new risks. One of the biggest

challenges in digital transformation is ensuring security, privacy, and compliance.


Traditional IT boundaries are disappearing and organisations now need to protect data on employee-owned mobile devices and SaaS applications not operated by the IT team. If they do not adapt their approach to security, companies face the risk of significant financial loss, damage to customer satisfaction, and market reputation.


 

Microsoft Security Certifications


There are 2 popular security certifications by Microsoft:

  • MS-500: Microsoft 365 Security Administrator

  • AZ-500: Microsoft Azure Security Engineer

We can help your organisation obtain the security skills you need. Our VILT training method allows candidates from any location to attend training.


Microsoft 365 Security


The Microsoft 365 Security administrator collaborates with the Microsoft 365 Enterprise Administrator, business stakeholders and other workload administrators to plan and implement security strategies and to ensures that the solutions comply with the policies and regulations of the organization. This role proactively secures Microsoft 365 enterprise environment, and aligns with certification exam MS-500.


Responsibilities include responding to threats, implementing, managing and monitoring security and compliance solutions for the Microsoft 365 environment. They respond to incidents, investigations and enforcement of data governance. The Microsoft 365 Security administrator is familiar with Microsoft 365 workloads and hybrid environments. This role has strong skills and experience with identity protection, information protection, threat protection, security management and data governance.


Contact us to attend the M365 Security course.


Microsoft Azure Security


This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations.


This course is for Azure Security Engineers who are planning to take the associated certification exam AZ-500, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialise in providing security for Azure-based digital platforms and play an integral role in protecting an organization's data.


Contact us to attend the Azure Security course.


 

Digital Defense Report


COVID-19-themed attacks


The telemetry shows that China, the United States, and Russia were hit the hardest, but every country in the world saw at least one COVID-19-themed attack, with the volume of

successful attacks in outbreak-hit countries increasing as fear and the desire for information grew.

Relative impact of COVID-19-themed attacks across the world by file count
Relative impact of COVID-19-themed attacks across the world by file count (as of July 1, 2020)

Top 5 spoofed brands


Many credential phishing scams start by imitating a well-known brand, enterprise cloud service, or government entity. They require users to click on a link that leads to a fake login site and lures them into revealing their credentials.

  • Microsoft

  • UPS

  • Amazon

  • Apple

  • Zoom


Top 10 targeted industries


Given the time dedicated to research and post-compromise reconnaissance, cybercriminals know which industries frequently wire large payments.

  • Accounting & Consulting

  • Wholesale Distribution

  • IT Services

  • Real Estate

  • Education

  • Healthcare

  • Chemicals

  • High Tech & Electronics

  • Legal Services

  • Outsourced Services


Malware: banking trojans


Banking trojans, intended to steal credentials from online banking and finance sites, have been a consistent threat in the landscape over the past decade. The nature of many banking trojans was always modular and extensible, with additional modules and capabilities deployed or downloaded after the initial infection.

Trickbot banking trojan prevalence, April 2020
Trickbot banking trojan prevalence, April 2020
 

Contact us to get your Cyber Security skills and competency.

Comments


bottom of page